For Outstation Students, we are having online project classes both technical and coding using net-meeting software
For details, Call: 9886692401/9845166723
DHS Informatics providing latest 2021 – 2022 IEEE projects on Blockchain projects for the final year engineering students. DHS Informatics trains all students in Blockchain techniques to develop their project with good idea what they need to submit in college to get good marks. DHS Informatics offers placement training in Blockchain at Bangalore and the program name is OJT – On Job Training, job seekers as well as final year college students can join in this placement training program and job opportunities in their dream IT companies. We are providing IEEE projects for B.E / B.TECH, M.TECH, MCA, BCA, DIPLOMA students from more than two decades.IEEE Blockchain projects Bangalore
Aiming at ensure the security and self-control of heterogeneuos alliance network, this paper proposes a novel structure of identity authentication baseed on domestic commercial cryptography with blockchain in the heterogeneous alliance network. The domestic commercial cryptographic algorithms such as SM2,SM3,SM4,SM9 and ZUC, is adopted to solve encryption,decryption,signature and verification of blovk chain , whose key steps of data layernare solved by using domestic commercial cryptographic algorithms .In addition , it is the distributed way to produce the public key and private key for the security of the keys. Therfore, the cross domain identity authentication in the heterogeneous alliance network can be executed safely and effectively.
Decentralized storage powered by blockchain is becoming a new trend that allows data owners to outsource their data to remote storage resources offered by various storage providers. Unfortunately, unqualified storage providers easily encounter unpredictable downtime due to security threats, such as malicious attacks or system failures, which is unacceptable in many real-time or data-driven applications. As a result, continuous data integrity should be guaranteed in decentralized storage, which ensures that data is intact and available for the entire storage period. However, this requires frequent checking for long time periods and incurs heavy burdens of both communication and computation, especially in a big data scenario. In this paper, we propose an efficient continuous big data integrity checking approach for decentralized storage. We design a data-time sampling strategy that randomly checks the integrity of multiple files at each time slot with high checking probability. Furthermore, to tackle the fairness problem derived from the sampling strategy, we propose a fair approach by designing an arbitration algorithm with the verifiable random function. Security analysis shows the security of our approach under the random oracle model. Evaluation and experiments demonstrate that our approach is more efficient in the big data scenario compared with the state-of-the-arts.
Network slicing is the 5G research field that address the services requirements ccompliance over the same network. In order to robustly and securely manage the different slices in a network, we propose to use blockchain, a distributed structure that stores data without the need of an external entity to ensure data integrity and readability. In this paper , we present a proposal on deploying a network slicing solution for Non-Public Networks(NPNs) in health environments usings blockchain technology. Our solution aims to provide both performace isolation over wireless networks and privacy.
An Electronic Health Record(EHR) is an electronic, official health recrd that contains a systematic collection of health information of a patient, which is maintained by a healthcare provider. EHRs have always been considered as the technology that has the potential to revoluntionize healthcare,however, ther are some drawbacks that prevents healthcare institutions from supporting them. The main concerns are patients privacy and their data security, numerous data breaches of hospitals have caused the loss of patients EHRs. Multiple solutions have been proposed to allow the patients to take control of their EHR data access, but a secure, and private system that would allow for flawless sharing of EHRs does not exists. In this paper, a hybrid distributed system architecture that addresses these drawbacks is proposed. The proposed system utilizes the decentralized systems data storage model in a centralized system to allow for the high data reproducibility and availability of decentralized systems, while allowing for the high security by authorization and authentication of centralized systems; iy also utilizes the blockchain which allows for security , patients pseudo-anonymity, patients EHRs usage consent requirement, and eventual consistency of the data among peers, while keeping a ledger of all shared EHRs among healthcare providers.
Cloud servers offer data owners the opportunity to upload and store encrypted data that the several data users can access. However , after outsourcing data to the cloud , dataowners have limited control of their data, and external systems are incorporated to manage it. Several research – based solutions use encryption techniques to prevent unauthorized access to the data but ignore the challenge of maintainingthe trace of valid changes applied to the data. Provenance data can be used to ascertain the integrity of the data and , therefore, should be immutable and secured from adversaries since it contains private information.This article propposes an efficient way of securing access logs by leveraging block chain. A generic framework is designed, tesyed, and evaluated , with results showing our model can effectively enhance the security of the provenance data.
Blockchain is an emerging decentralized architecture and distributed public ledger technology underlying Bitcoin, and has recently attracted intensive attention from governments, financial institutions and high-tech enterprises. It is believed that blockchain can improve efficiency, reduce costs and enhance data security, but it is still in the face of serious privacy issues which may hinder the wide application of blockchain. In this paper, We present a practical scheme by adding the Identity-Based encryption system, which effectively improves the data privacy for non-transaction applications. Analyses show that our proposal has a high security level which can prevent both disguise and passive attacks, and is functional, effective and practical in many applications for non-transactional scenarios.
The electronic voting has emerged over time as a replacement to the paper-based voting to reduce the redundancies and inconsistencies. The historical perspective presented in the last two decades suggests that it has not been so successful due to the security and privacy flaws observed over time. This paper suggests a framework by using effective hashing techniques to ensure the security of the data. The concept of block creation and block sealing is introduced in this paper. The introduction of a block sealing concept helps in making the blockchain adjustable to meet the need of the polling process. The use of consortium blockchain is suggested, which ensures that the blockchain is owned by a governing body (e.g., election commission), and no unauthorized access can be made from outside. The framework proposed in this paper discusses the effectiveness of the polling process, hashing algorithms’ utility, block creation and sealing, data accumulation, and result declaration by using the adjustable blockchain method. This paper claims to apprehend the security and data management challenges in blockchain and provides an improved manifestation of the electronic voting process.
Cloud computing provides individuals and enterprises massive computing power and scalable storage capacities to support a variety of big data applications in domains like health care and scientific research, therefore more and more data owners are involved to outsource their data on cloud servers for great convenience in data management and mining. However, data sets like health records in electronic documents usually contain sensitive information, which brings about privacy concerns if the documents are released or shared to partially untrusted third-parties in cloud. A practical and widely used technique for data privacy preservation is to encrypt data before outsourcing to the cloud servers, which however reduces the data utility and makes many traditional data analytic operators like keyword-based top- k k document retrieval obsolete. In this paper, we investigate the multi-keyword top- k k search problem for big data encryption against privacy breaches, and attempt to identify an efficient and secure solution to this problem. Specifically, for the privacy concern of query data, we construct a special tree-based index structure and design a random traversal algorithm, which makes even the same query to produce different visiting paths on the index, and can also maintain the accuracy of queries unchanged under stronger privacy. For improving the query efficiency, we propose a group multi-keyword top- k k search scheme based on the idea of partition, where a group of tree-based indexes are constructed for all documents. Finally, we combine these methods together into an efficient and secure approach to address our proposed top- k k similarity search. Extensive experimental results on real-life data sets demonstrate that our proposed approach can significantly improve the capability of defending the privacy breaches, the scalability and the time efficiency of query processing over the state-of-the-art methods.
Attribute-based encryption has been widely employed to achieve data confidentiality and fine-grained access control in cloud storage. To enable users to identify accessible data in numerous dataset, clear attributes should be appended to the ciphertext, which results in the exposure of attribute privacy. In this paper, we propose an efficient attribute-based access control with authorized search scheme (EACAS) in cloud storage by extending the anonymous key-policy attribute-based encryption (AKP-ABE) to support fine-grained data retrieval with attribute privacy preservation. Specifically, by integrating the key delegation technique into AKP-ABE, EACAS enables data users to customize search policies based on their access policies, and generate the corresponding trapdoor using the secret key granted by the data owner to retrieve their interested data. In addition, a virtual attribute with no semantic meaning is utilized in data encryption and trapdoor generation to empower the cloud to perform attribute-based search on the outsourced ciphertext without knowing the underlying attributes or outsourced data. The data owners can achieve fine-grained access control on their outsourced data, and the data users are flexible to search their interested data based on protected attributes through customizing the search policies. Finally, we demonstrate that EACAS is more efficient than existing solutions on computation and storage overheads.
Block chaining technology is a distributed infrastructure and computing paradigm. The latest version is represented by the super account book. The latest version is block chain 3. From the perspective of large data, this paper systematically combs the essence and core technology of block chain technology, and expounds the application status of block chain technology in accounting industry. This paper focuses on building an irreversible distributed financial system based on large data in the context of large data in order to apply the scenario of “Block Chain Technology + Accounting Services” to the accounting industry, and prospects the application of Block Chain Storage Technology and Intelligent Internet of Things technology based on large data, providing inspiration for future research.
Cloud computing has become increasingly popular among individuals and enterprises because of the benefits it provides by outsourcing their data to cloud servers. However, the security of the outsourced data has become a major concern. For privacy concerns, searchable encryption, which supports searching over encrypted data, has been proposed and developed rapidly in secure Boolean search and similarity search. However, different users may have different requirements on their queries, which mean different weighted searches. This problem can be solved perfectly in the plaintext domain, but hard to be addressed over encrypted data. In this study, the authors use locality-sensitive hashing (LSH) and searchable symmetric encryption (SSE) to deal with a privacy preserving weighted similarity search. In the authors’ scheme, data users can generate a search request and set the weight for each attribute according to their requirements. They treat the LSH values as keywords and mix them into the framework of SSE. They use homomorphic encryption to securely address the weight problem and return the top-k data without revealing any weight information of data users. They formally analysed the security strength of their scheme. Extensive experiments on actual datasets showed that their scheme is extremely effective and efficient.
Searchable encryption facilitates cloud server to search over encrypted data without decrypting the data. Single keyword based searchable encryption enables a user to access only a subset of documents, which contains the keyword of the user’s interest. In this paper we present a single keyword based searchable encryption scheme for the applications where multiple data owners upload their data and multiple users access the data. We use attribute based encryption scheme that allows user to access the selective subset of data from cloud without revealing his/her access rights to the cloud server. The proposed scheme is proven adaptively secure against chosen-keyword attack in the random oracle model. We have implemented the scheme on Google cloud instance and the performance of the scheme found feasible in real-world applications.
ABSTRACT: Biometric identification has become increasingly popular in recent years. With the development of cloud computing, database owners are motivated to outsource the large size of biometric data and identification tasks to the cloud to get rid of the expensive storage and computation costs, which however brings potential threats to users’ privacy. In this paper, we propose an efficient and privacy-preserving biometric identification outsourcing scheme. Specifically, the biometric data is encrypted and outsourced to the cloud server. To execute a biometric identification, the database owner encrypts the query data and submits it to the cloud. The cloud performs identification operations over the encrypted database and returns the result to the database owner. A thorough security analysis indicates the proposed scheme is secure even if attackers can forge identification requests and collude with the cloud. Compared with previous protocols, experimental results show the proposed scheme achieves a better performance in both preparation and identification procedures.
Abstract : E-VOTING IS AMONG the key public sectors that can be disrupted by blockchain technology.1 The idea in blockchain-enabled e-voting (BEV) is simple. To use a digital-currency analogy, BEV issues each voter a “wallet” containing a user credential. Each voter gets a single “coin” representing one opportunity to vote. Casting a vote transfers the voter’s coin to a candidate’s wallet. A voter can spend his or her coin only once. However, voters can change their vote before a preset deadline. Contact: +91-98451 66723 ☎ 080-413 07435
Abstract: Electronic Health Records (EHRs) are entirely controlled by hospitals instead of patients, which complicates seeking medical advices from different hospitals. Patients face a critical need to focus on the details of their own healthcare and restore management of their own medical data. The rapid development of blockchain technology promotes population healthcare, including medical records as well as patient-related data. This technology provides patients with comprehensive, immutable records and access to EHRs free from service providers and treatment websites. In this paper, to guarantee the validity of EHRs encapsulated in blockchain, we present an attribute-based signature scheme with multiple authorities, in which a patient endorses a message according to the attribute while disclosing no information other than the evidence that he has attested to it. Furthermore, there are multiple authorities without a trusted single or central one to generate and distribute public/private keys of the patient, which avoids the escrow problem and conforms to the mode of distributed data storage in the blockchain. Contact: +91-98451 66723 ☎ 080-413 07435
Abstract: In a block-chain IoT environment, when data or device authentication information is put on a block chain, personal information may be leaked through the proof-of-work process or address search. In this paper, we apply Zero- Knowledge proof to a smart meter system to prove that a prover without disclosing information such as public key, and we have studied how to enhance anonymity of block chain for privacy protection . Contact: +91-98451 66723 ☎ 080-413 07435
Abstract: Blockchains, such as Bitcoin and Ethereum and their respective P2P networks have seen significant adoption in many sectors in the past few years. All these technologies that use the Blockchain pattern show that it is possible to rebuild any transactional system with better performance without relying on any trusted parties to manage transactions between peers. This insight has lead many companies to invest millions to understand the technology and to find a way to migrate from centralized to decentralized solutions. Contact: +91-98451 66723 ☎ 080-413 07435
Abstract: The cyber physical system (CPS) has gained considerable success in large-scale distributed integration environment. In such systems, the sensor devices collect data which would be disseminated via reliable manner to all interested co-operant entities from the physical world. However, highly unreliable environment of CPS, for example, a number of limitations of existing network middle wares, makes secure and reliable data distribution services a challenge issue. In this paper, we propose a new architecture called secure pub-sub (SPS) without middle ware, i.e., blockchain-based fair payment with reputation. In SPS, publishers publish a topic on the blockchain and subscribers specify an interest message by making a deposit to subscribing the topic. Then, if the interest message matches the topic, the publisher transmits the encrypted content of the topic to the blockchain such that the subscribers can decrypt the ciphertext to obtain the content, and mark the publisher as its reputation. Finally, the publisher receives the payment from the subscriber. The new proposal provides confidentiality and reliability of data, anonymity of subscribers and payment fairness between the publishers and subscribers. Different from the traditional pub-sub services, no trusted third party is involved in our system due to employing blockchain technique. The security of the proposed SPS is analyzed as well. The implementation of the protocol on Ethereum of smart contract demonstrates the validity of SPS. Contact: +91-98451 66723 ☎ 080-413 07435
IEEE BLOCKCHAIN PROJECTS (2020 – 2021)
DHS Informatics believes in students’ stratification, we first brief the students about the technologies and type of Blockchain projects and other domain projects. After complete concept explanation of the IEEE Blockchain projects, students are allowed to choose more than one IEEE Blockchain projects for functionality details. Even students can pick one project topic from Blockchain and another two from other domains like Blockchain, data mining, image process, information forensic, big data, Blockchain, Blockchain, data science, block chain etc. DHS Informatics is a pioneer institute in Bangalore / Bengaluru; we are supporting project works for other institute all over India. We are the leading final year project centre in Bangalore / Bengaluru and having office in five different main locations Jayanagar, Yelahanka, Vijayanagar, RT Nagar & Indiranagar.
We allow the ECE, CSE, ISE final year students to use the lab and assist them in project development work; even we encourage students to get their own idea to develop their final year projects for their college submission.
DHS Informatics first train students on project related topics then students are entering into practical sessions. We have well equipped lab set-up, experienced faculties those who are working in our client projects and friendly student coordinator to assist the students in their college project works.
We appreciated by students for our Latest IEEE projects & concepts on final year Blockchain projects for ECE, CSE, and ISE departments.
Latest IEEE 2020 – 2021 projects on Blockchain with real time concepts which are implemented using Java, MATLAB, and NS2 with innovative ideas. Final year students of computer Blockchain, computer science, information science, electronics and communication can contact our corporate office located at Jayanagar, Bangalore for Blockchain project details.
IEEE Blockchain projects Bangalore
A Blockchain, originally block chain, is a growing list of records, called blocks, which are linked using cryptography. Blockchain which are readable by the public are widely used by crypto currencies. Private Blockchain has been proposed for business use. Some marketing of Blockchain has been called “snake oil.”
Each block contains a cryptographic hash of the previous block, a timestamp, and transaction data (generally represented as a merkle tree root hash). By design, a Blockchain is resistant to modification of the data. It is “an open, distributed ledger that can record transactions between two parties efficiently and in a verifiable and permanent way”. For use as a distributed ledger, a Blockchain is typically managed by a peer-to-peer network collectively adhering to a protocol for inter-node communication and validating new blocks. Once recorded, the data in any given block cannot be altered retroactively without alteration of all subsequent blocks, which requires consensus of the network majority. Though Blockchain records are not unalterable, Blockchain may be considered secure by design and exemplify a distributed computing system with high Byzantine fault tolerance. Decentralized consensus has therefore been claimed with a Blockchain.IEEE Blockchain projects Bangalore
Blockchain was invented by Satoshi Nakamoto in 2008 to serve as the public transaction ledger of the crypto currency Bitcoins. The invention of the Blockchain for Bitcoins made it the first digital currency to solve the double-spending problem without the need of a trusted authority or central server. The Bitcoins design has inspired other applications.IEEE Blockchain projects Bangalore
A Blockchain is a decentralized, distributed and public digital ledger that is used to record transactions across many computers so that the record cannot be altered retroactively without the alteration of all subsequent blocks and the consensus of the network. This allows the participants to verify and audit transactions inexpensively. A Blockchain database is managed autonomously using a peer-to-peer network and a distributed time stamping server. They are authenticated by mass collaboration powered by collective self-interests. The result is a robust workflow where participants’ uncertainty regarding data security is marginal. The use of a Blockchain removes the characteristic of infinite reproducibility from a digital asset. It confirms that each unit of value was transferred only once, solving the long-standing problem of double spending. Blockchain have been described as a value-exchange protocol. This Blockchain-based exchange of value can be completed quicker, safer and cheaper than with traditional systems A Blockchain can assign title rights because, when properly set up to detail the exchange agreement, it provides a record that compels offer and acceptance.IEEE Blockchain projects Bangalore
IEEE Blockchain projects Bangalore
Types of Blockchain:
Currently, there are three types of Blockchain networks – public Blockchain, private Blockchain and consortium Blockchain.
Public Blockchain – A public Blockchain has absolutely no access restrictions. Anyone with an internet connection can send transactions (disambiguation needed) to it as well as become a validator (i.e., participate in the execution of a consensus protocol). Usually, such networks offer economic incentives for those who secure them and utilize some type of a Proof of Stake or Proof of Work algorithm. Some of the largest, most known public Blockchain are Bitcoins and Ethereum. IEEE Blockchain projects Bangalore
Private Blockchain –A private Blockchain is permissioned. One cannot join it unless invited by the network administrators. Participant and validator access is restricted. This type of Blockchain can be considered a middle-ground for companies that are interested in the Blockchain technology in general but are not comfortable with a level of control offered by public networks. Typically, they seek to incorporate Blockchain into their accounting and record-keeping procedures without sacrificing autonomy and running the risk of exposing sensitive data to the public internet.IEEE Blockchain projects Bangalore
Consortium Blockchains – A consortium Blockchain is often said to be semi-decentralized. It, too, is permissioned but instead of a single organization controlling it, a number of companies might each operate a node on such a network. The administrators of a consortium chain restrict users’ reading rights as they see fit and only allow a limited set of trusted nodes to execute a consensus protocol.IEEE Blockchain projects Bangalore